First published: Mon Sep 03 2018(Updated: )
GNOME GLib 2.56.1 has an out-of-bounds read vulnerability in g_markup_parse_context_parse() in gmarkup.c, related to utf8_str().
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/glib2.0 | <2.56.2-0ubuntu0.18.04.2 | 2.56.2-0ubuntu0.18.04.2 |
ubuntu/glib2.0 | <2.40.2-0ubuntu1.1 | 2.40.2-0ubuntu1.1 |
ubuntu/glib2.0 | <2.58.0-1 | 2.58.0-1 |
ubuntu/glib2.0 | <2.48.2-0ubuntu4.1 | 2.48.2-0ubuntu4.1 |
debian/glib2.0 | 2.66.8-1+deb11u4 2.66.8-1+deb11u3 2.74.6-2+deb12u3 2.74.6-2+deb12u2 2.82.0-1 | |
GNOME GLib | =2.56.1 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this GNOME GLib vulnerability is CVE-2018-16429.
The severity rating of CVE-2018-16429 is high with a severity value of 7.5.
The affected software versions include GNOME GLib 2.56.1, 2.58.0-1, 2.40.2-0ubuntu1.1, 2.48.2-0ubuntu4.1, and 2.56.2-0ubuntu0.18.04.2.
To fix the vulnerability in GNOME GLib, update to version 2.58.0-1 or later.
You can find more information about CVE-2018-16429 in the references provided: [Link 1](https://gitlab.gnome.org/GNOME/glib/commit/cec71705406f0b2790422f0c1aa0ff3b4b464b1b), [Link 2](https://gitlab.gnome.org/GNOME/glib/issues/1361), [Link 3](https://usn.ubuntu.com/3767-1/).